The “Consumerization of IT” trend is here to stay. However, it’s created a free-for-all attitude among corporate IT users seeking new ways to improve productivity. Combined with BYOD, the risks have grown exponentially from  unauthorized software invading your network. Some of these solutions may be good, but should get vetted and be placed on an approved vendor list.

Here’s one way you can gain visibility and lock down shadow IT:

Article link
“Using the open DMARC standard, companies can specify a list of servers that are authorized to send email on behalf of the company. Servers that attempt to use the company’s domain name but aren’t on the authorized list will find that their email is flagged.”

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s